The vulnerabilities include a false cross-site request (CVE-2015-0965) that lets an arbitrary site log in without the user's knowledge; a hard-coded backdoor (CVE-2015-0966), that could allow hackers to log in with the password yZgO8Bvj; and a cross-site scripting vulnerability in the firewall configuration page (CVE-2015-0964), letting attackers inject Javascript.

All an attacker needs to know is the victim's internal gateway IP address, which is by default 192.168.0.1. By having access to the router's management interface, he can modify router settings and configure the victim's network for further exfiltration and exploitation.

Among the affected firmware versions are: SBG6580–6.5.2.0-GA–06–077-NOSH, and SBG6580-8.6.1.0-GA-04-098-NOSH. Affected users can protect their networks by configuring a custom local firewall that will prevent accidental (or malicious) connectivity.